lighttpd 1.4.x
https://www.lighttpd.net/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
345 lines
12 KiB
345 lines
12 KiB
/* |
|
* http_cgi - Common Gateway Interface (CGI) interfaces (RFC 3875) |
|
* |
|
* Copyright(c) 2016-2017 Glenn Strauss gstrauss()gluelogic.com All rights reserved |
|
* License: BSD 3-clause (same as lighttpd) |
|
*/ |
|
#include "first.h" |
|
|
|
#include "http_cgi.h" |
|
|
|
#include "sys-socket.h" |
|
#include <string.h> |
|
|
|
#include "base.h" |
|
#include "array.h" |
|
#include "buffer.h" |
|
#include "chunk.h" |
|
#include "log.h" |
|
#include "http_header.h" |
|
#include "sock_addr.h" |
|
|
|
handler_t |
|
http_cgi_local_redir (request_st * const r) |
|
{ |
|
/* [RFC3875] The Common Gateway Interface (CGI) Version 1.1 |
|
* [RFC3875] 6.2.2 Local Redirect Response |
|
* |
|
* The CGI script can return a URI path and query-string |
|
* ('local-pathquery') for a local resource in a Location header field. |
|
* This indicates to the server that it should reprocess the request |
|
* using the path specified. |
|
* |
|
* local-redir-response = local-Location NL |
|
* |
|
* The script MUST NOT return any other header fields or a message-body, |
|
* and the server MUST generate the response that it would have produced |
|
* in response to a request containing the URL |
|
* |
|
* scheme "://" server-name ":" server-port local-pathquery |
|
* |
|
* (While not required by the RFC, do not send local-redir back to same URL |
|
* since CGI should have handled it internally if it really wanted to do |
|
* that internally) |
|
*/ |
|
|
|
size_t ulen = buffer_clen(&r->uri.path); |
|
const buffer *vb = http_header_response_get(r, HTTP_HEADER_LOCATION, |
|
CONST_STR_LEN("Location")); |
|
if (NULL != vb |
|
&& vb->ptr[0] == '/' |
|
&& (0 != strncmp(vb->ptr, r->uri.path.ptr, ulen) |
|
|| ( vb->ptr[ulen] != '\0' |
|
&& vb->ptr[ulen] != '/' |
|
&& vb->ptr[ulen] != '?')) |
|
&& 1 == r->resp_headers.used /*"Location"; no "Status" or NPH response*/ |
|
&& r->http_status >= 300 && r->http_status < 400) { |
|
if (++r->loops_per_request > 5) { |
|
log_error(r->conf.errh, __FILE__, __LINE__, |
|
"too many internal loops while processing request: %s", |
|
r->target_orig.ptr); |
|
r->http_status = 500; /* Internal Server Error */ |
|
r->resp_body_started = 0; |
|
r->handler_module = NULL; |
|
return HANDLER_FINISHED; |
|
} |
|
|
|
buffer_copy_buffer(&r->target, vb); |
|
|
|
if (r->reqbody_length) { |
|
if (r->reqbody_length != r->reqbody_queue.bytes_in) |
|
r->keep_alive = 0; |
|
r->reqbody_length = 0; |
|
chunkqueue_reset(&r->reqbody_queue); |
|
} |
|
|
|
if (r->http_status != 307 && r->http_status != 308) { |
|
/* Note: request body (if any) sent to initial dynamic handler |
|
* and is not available to the internal redirect */ |
|
r->http_method = HTTP_METHOD_GET; |
|
} |
|
|
|
/*(caller must reset request as follows)*/ |
|
/*http_response_reset(r);*/ /*(sets r->http_status = 0)*/ |
|
/*plugins_call_handle_request_reset(r);*/ |
|
|
|
return HANDLER_COMEBACK; |
|
} |
|
|
|
return HANDLER_GO_ON; |
|
} |
|
|
|
|
|
static void |
|
http_cgi_encode_varname (buffer * const b, const char * const restrict s, const size_t len, const int is_http_header) |
|
{ |
|
char * const restrict p = buffer_string_prepare_copy(b, len + 5); |
|
size_t i, j = 0; |
|
|
|
if (is_http_header) { |
|
#if 0 /*(special-cased in caller that sets is_http_header)*/ |
|
if (len == 12 && buffer_eq_icase_ssn(s, "Content-Type", 12)) { |
|
buffer_copy_string_len(b, CONST_STR_LEN("CONTENT_TYPE")); |
|
return; |
|
} |
|
#endif |
|
memcpy(p, "HTTP_", 5); |
|
j = 5; /* "HTTP_" */ |
|
} |
|
|
|
for (i = 0; i < len; ++i) {/* uppercase alpha, pass numeric, map rest '_' */ |
|
const unsigned char c = s[i]; |
|
p[j++] = light_isalpha(c) ? c & ~0x20 : light_isdigit(c) ? c : '_'; |
|
} |
|
buffer_truncate(b, j); |
|
} |
|
|
|
|
|
int |
|
http_cgi_headers (request_st * const r, http_cgi_opts * const opts, http_cgi_header_append_cb cb, void *vdata) |
|
{ |
|
/* CGI-SPEC 6.1.2, FastCGI spec 6.3 and SCGI spec */ |
|
|
|
/* note: string ptrs passed to cb() func must not be NULL */ |
|
|
|
int rc = 0; |
|
uint32_t len; |
|
buffer * const tb = r->tmp_buf; |
|
const char *s; |
|
size_t n; |
|
char buf[INET6_ADDRSTRLEN + 1]; /*(also larger than LI_ITOSTRING_LENGTH)*/ |
|
|
|
/* (CONTENT_LENGTH must be first for SCGI) */ |
|
if (!opts->authorizer) |
|
rc |= cb(vdata, CONST_STR_LEN("CONTENT_LENGTH"), |
|
buf, li_itostrn(buf,sizeof(buf),r->reqbody_length)); |
|
|
|
n = buffer_clen(&r->uri.query); |
|
rc |= cb(vdata, CONST_STR_LEN("QUERY_STRING"), |
|
n ? r->uri.query.ptr : "", n); |
|
|
|
s = r->target_orig.ptr; |
|
n = buffer_clen(&r->target_orig); |
|
len = opts->strip_request_uri ? buffer_clen(opts->strip_request_uri) : 0; |
|
if (len) { |
|
/* e.g. /app1/index/list |
|
* stripping /app1 or /app1/ should lead to /index/list |
|
* (trailing slash removed from strip_request_uri at config time)*/ |
|
if (n < len || 0 != memcmp(s, opts->strip_request_uri->ptr, len) |
|
|| s[len] != '/') |
|
len = 0; |
|
} |
|
rc |= cb(vdata, CONST_STR_LEN("REQUEST_URI"), s+len, n-len); |
|
|
|
if (!buffer_is_equal(&r->target, &r->target_orig)) |
|
rc |= cb(vdata, CONST_STR_LEN("REDIRECT_URI"), |
|
BUF_PTR_LEN(&r->target)); |
|
|
|
/* set REDIRECT_STATUS for php compiled with --force-redirect |
|
* (if REDIRECT_STATUS has not already been set by error handler) */ |
|
if (0 == r->error_handler_saved_status) |
|
rc |= cb(vdata, CONST_STR_LEN("REDIRECT_STATUS"), |
|
CONST_STR_LEN("200")); |
|
|
|
/* |
|
* SCRIPT_NAME, PATH_INFO and PATH_TRANSLATED according to |
|
* http://cgi-spec.golux.com/draft-coar-cgi-v11-03-clean.html |
|
* (6.1.14, 6.1.6, 6.1.7) |
|
*/ |
|
if (!opts->authorizer) { |
|
rc |= cb(vdata, CONST_STR_LEN("SCRIPT_NAME"), |
|
BUF_PTR_LEN(&r->uri.path)); |
|
if (!buffer_is_blank(&r->pathinfo)) { |
|
rc |= cb(vdata, CONST_STR_LEN("PATH_INFO"), |
|
BUF_PTR_LEN(&r->pathinfo)); |
|
/* PATH_TRANSLATED is only defined if PATH_INFO is set |
|
* Note: not implemented: re-url-encode '?' '=' ';' for |
|
* (RFC 3875 4.1.6) */ |
|
const buffer * const bd = (opts->docroot) |
|
? opts->docroot |
|
: &r->physical.basedir; |
|
buffer_copy_path_len2(tb, BUF_PTR_LEN(bd), |
|
BUF_PTR_LEN(&r->pathinfo)); |
|
rc |= cb(vdata, CONST_STR_LEN("PATH_TRANSLATED"), |
|
BUF_PTR_LEN(tb)); |
|
} |
|
} |
|
|
|
/* |
|
* SCRIPT_FILENAME and DOCUMENT_ROOT for php |
|
* The PHP manual http://www.php.net/manual/en/reserved.variables.php |
|
* treatment of PATH_TRANSLATED is different from the one of CGI specs. |
|
* (see php.ini cgi.fix_pathinfo = 1 config parameter) |
|
*/ |
|
|
|
if (opts->docroot) { |
|
/* alternate docroot, e.g. for remote FastCGI or SCGI server */ |
|
buffer_copy_path_len2(tb, BUF_PTR_LEN(opts->docroot), |
|
BUF_PTR_LEN(&r->uri.path)); |
|
rc |= cb(vdata, CONST_STR_LEN("SCRIPT_FILENAME"), |
|
BUF_PTR_LEN(tb)); |
|
rc |= cb(vdata, CONST_STR_LEN("DOCUMENT_ROOT"), |
|
BUF_PTR_LEN(opts->docroot)); |
|
} |
|
else { |
|
if (opts->break_scriptfilename_for_php) { |
|
/* php.ini config cgi.fix_pathinfo = 1 need a broken SCRIPT_FILENAME |
|
* to find out what PATH_INFO is itself |
|
* |
|
* see src/sapi/cgi_main.c, init_request_info() |
|
*/ |
|
buffer_copy_path_len2(tb, BUF_PTR_LEN(&r->physical.path), |
|
BUF_PTR_LEN(&r->pathinfo)); |
|
rc |= cb(vdata, CONST_STR_LEN("SCRIPT_FILENAME"), |
|
BUF_PTR_LEN(tb)); |
|
} |
|
else |
|
rc |= cb(vdata, CONST_STR_LEN("SCRIPT_FILENAME"), |
|
BUF_PTR_LEN(&r->physical.path)); |
|
rc |= cb(vdata, CONST_STR_LEN("DOCUMENT_ROOT"), |
|
BUF_PTR_LEN(&r->physical.basedir)); |
|
} |
|
|
|
s = get_http_method_name(r->http_method); |
|
force_assert(s); |
|
rc |= cb(vdata, CONST_STR_LEN("REQUEST_METHOD"), s, strlen(s)); |
|
|
|
s = get_http_version_name(r->http_version); |
|
force_assert(s); |
|
rc |= cb(vdata, CONST_STR_LEN("SERVER_PROTOCOL"), s, strlen(s)); |
|
|
|
if (r->conf.server_tag) { |
|
s = r->conf.server_tag->ptr; |
|
n = buffer_clen(r->conf.server_tag); |
|
} |
|
else { |
|
s = ""; |
|
n = 0; |
|
} |
|
rc |= cb(vdata, CONST_STR_LEN("SERVER_SOFTWARE"), s, n); |
|
|
|
rc |= cb(vdata, CONST_STR_LEN("GATEWAY_INTERFACE"), |
|
CONST_STR_LEN("CGI/1.1")); |
|
|
|
rc |= cb(vdata, CONST_STR_LEN("REQUEST_SCHEME"), |
|
BUF_PTR_LEN(&r->uri.scheme)); |
|
|
|
if (buffer_is_equal_string(&r->uri.scheme, CONST_STR_LEN("https"))) |
|
rc |= cb(vdata, CONST_STR_LEN("HTTPS"), CONST_STR_LEN("on")); |
|
|
|
const connection * const con = r->con; |
|
const server_socket * const srv_sock = con->srv_socket; |
|
const size_t tlen = buffer_clen(srv_sock->srv_token); |
|
n = srv_sock->srv_token_colon; |
|
if (n < tlen) { /*(n != tlen)*/ |
|
s = srv_sock->srv_token->ptr+n+1; |
|
n = tlen - (n+1); |
|
} |
|
else { |
|
s = "0"; |
|
n = 1; |
|
} |
|
rc |= cb(vdata, CONST_STR_LEN("SERVER_PORT"), s, n); |
|
|
|
n = 0; |
|
switch (sock_addr_get_family(&srv_sock->addr)) { |
|
case AF_INET: |
|
case AF_INET6: |
|
if (sock_addr_is_addr_wildcard(&srv_sock->addr)) { |
|
sock_addr addrbuf; |
|
socklen_t addrlen = sizeof(addrbuf); |
|
if (0 == getsockname(con->fd,(struct sockaddr *)&addrbuf,&addrlen)){ |
|
/* future: might add a one- or two- element cache |
|
* or use sock_addr_cache_inet_ntop_copy_buffer() into tb */ |
|
s = sock_addr_inet_ntop(&addrbuf, buf, sizeof(buf)); |
|
if (s) |
|
n = strlen(s); |
|
else |
|
s = ""; |
|
} |
|
else |
|
s = ""; |
|
} |
|
else { |
|
s = srv_sock->srv_token->ptr; |
|
n = srv_sock->srv_token_colon; |
|
} |
|
break; |
|
default: |
|
s = ""; |
|
break; |
|
} |
|
rc |= cb(vdata, CONST_STR_LEN("SERVER_ADDR"), s, n); |
|
|
|
n = buffer_clen(r->server_name); |
|
if (n) { |
|
s = r->server_name->ptr; |
|
if (s[0] == '[') { |
|
const char *colon = strstr(s, "]:"); |
|
if (colon) n = (colon + 1) - s; |
|
} |
|
else { |
|
const char *colon = strchr(s, ':'); |
|
if (colon) n = colon - s; |
|
} |
|
} /* else set to be same as SERVER_ADDR (above) */ |
|
rc |= cb(vdata, CONST_STR_LEN("SERVER_NAME"), s, n); |
|
|
|
rc |= cb(vdata, CONST_STR_LEN("REMOTE_ADDR"), |
|
BUF_PTR_LEN(&con->dst_addr_buf)); |
|
|
|
rc |= cb(vdata, CONST_STR_LEN("REMOTE_PORT"), buf, |
|
li_utostrn(buf,sizeof(buf),sock_addr_get_port(&con->dst_addr))); |
|
|
|
for (n = 0; n < r->rqst_headers.used; n++) { |
|
data_string *ds = (data_string *)r->rqst_headers.data[n]; |
|
if (!buffer_is_blank(&ds->value) && !buffer_is_unset(&ds->key)) { |
|
/* Security: Do not emit HTTP_PROXY in environment. |
|
* Some executables use HTTP_PROXY to configure |
|
* outgoing proxy. See also https://httpoxy.org/ */ |
|
if (ds->ext == HTTP_HEADER_OTHER |
|
&& buffer_eq_icase_slen(&ds->key, CONST_STR_LEN("Proxy"))) { |
|
continue; |
|
} |
|
else if (ds->ext == HTTP_HEADER_CONTENT_TYPE) |
|
buffer_copy_string_len(tb, CONST_STR_LEN("CONTENT_TYPE")); |
|
else |
|
http_cgi_encode_varname(tb, BUF_PTR_LEN(&ds->key), 1); |
|
rc |= cb(vdata, BUF_PTR_LEN(tb), |
|
BUF_PTR_LEN(&ds->value)); |
|
} |
|
} |
|
|
|
con->srv->request_env(r); |
|
|
|
for (n = 0; n < r->env.used; n++) { |
|
data_string *ds = (data_string *)r->env.data[n]; |
|
if (!buffer_is_unset(&ds->value) && !buffer_is_unset(&ds->key)) { |
|
http_cgi_encode_varname(tb, BUF_PTR_LEN(&ds->key), 0); |
|
rc |= cb(vdata, BUF_PTR_LEN(tb), |
|
BUF_PTR_LEN(&ds->value)); |
|
} |
|
} |
|
|
|
return rc; |
|
}
|
|
|